Cyber Security News

Increasingly, a physical security director's role, the branch of computer security that is specifically related to the Internet, with issues involving fraud and the protection of transfer of data and a company's brand.


Coca Cola Faces Lawsuit Over Unencrypted Laptop Data Theft

Coca-Cola is facing a potential class-action lawsuit after one of the people whose personal data was on one of a clutch of laptops stolen from the company says he suffered identity theft as a result of the breach.

Read More

U.S. Weather System Hacked

The National Oceanic and Atmospheric Administration, NOAA, said that four of its websites were hacked in recent weeks. 

Read More

Combining Network and Perimeter Security to Mitigate Attack Risks

 Data security used to be relatively simple. Office buildings and areas within them presented clear “perimeters” that companies could protect with locks, alarms, and if necessary, searches of belongings.  

Read More

Neiman Marcus Names First Chief Information Security Officer

Neiman Marcus Group Inc. has named Sarah Hendrickson as its first chief information security officer.

Read More

Hacking Tops List of Crimes Americans Worry About Most

As the list of major U.S. retailers hit by credit card hackers continues to grow this year, Americans are more likely to worry about having credit card information they used in stores stolen by computer hackers than any other crime.

Read More

Keys to Employee Cybersecurity

 Cyber breaches knows no boundaries and doesn’t discriminate based on business size. For example, a study by the National Cyber Security Alliance shows that even though 66 percent of the small businesses surveyed relied on the Internet on a daily basis and 69 percent handled sensitive data, only 23 percent had a written policy and procedure Internet security guide for their employees. Only 37 percent provided Internet safety training to their employees, and only 50 percent had a cybersecurity plan to keep their business secure. 

Read More

Health Care Data Security Plans on the Rise

 In August, Community Health Systems announced that an external group of hackers attacked its computer network that an external group of hackers attacked its computer network and stole non-medical data of 4.5 million patients – the second-largest HIPAA breach ever reported.  

Read More

Millennials Looking to Cybersecurity Careers, Security

Those of the Millennial Generation (born between 1980 and early 2000s) have upped their game to keep private information safe, but while they show a keen interest in cybersecurity careers, they don’t know exactly what that entails.

Read More

Ex-Employees Leaving with the Keys to Company Data

In July 2014 alone, 940,000 people in the Professional and Business Services industry left their jobs, according to the Bureau of Labor Statistics. The question is: How much power and access do those people still have over company data? 

Read More

Gary Gagnon: Unique-ness

 Many organizations protect their cyber infrastructure by looking inward, focusing on their own networks and systems. They dedicate themselves to reducing the attack surface, assessing their vulnerabilities, and conducting system patching – all to continuously monitor their own networks.  

Read More



Security in a Web 2.0+ World: A Standards-Based Approach

No Comments
Discover how technology is affecting your business, and why typical security mechanisms are failing to address the issue of risk and trust. View

Security 2020: Reduce Security Risks This Decade

No Comments
After years of focusing on IT security, we find that hackers are as active and effective as ever. This book gives application developers, networking and security professionals, those that create standards, and CIOs a straightforward look at the reality of today's IT security and a sobering forecast of what to expect in the next decade. View

The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws 2E

No Comments
This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. View

The Database Hacker's Handbook: Defending Database Servers

No Comments
Databases are the nerve center of our economy. Every piece of your personal information is stored there-medical records, bank accounts, employment history, pensions, car registrations, even your children's grades and what groceries you buy. Database attacks are potentially crippling-and relentless. View



Cybersecurity: A CEO and Director Issue

Contact: Adam Thomas

On Demand Learn how today’s cyber threat landscape is impacting business; how NIST’s voluntary cyber framework can be used to help your business better achieve its security goals; and, the business and legal risks of doing nothing.

Read More



Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.


Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

2014 November cover of Security Magazine

2014 November

Don't miss our 2014 Security 500 issue, with rankings, data on sectors, and other security benchmarkings, all contained within this November 2014 edition of Security magazine. Also, (re)learn the basics of lobby security and how to make the highest impact retrofit for your budget.
Table Of Contents Subscribe

Travel & the Ebola Risk

Are you and your enterprise restricting travel due to Ebola risks?
View Results Poll Archive


CompTIA Security+ Certification Study Guide
CompTIA's Security+ certification is a globally-recognized, vendor neutral exam that has helped over 60,000 IT professionals reach further and higher in their careers. The current Security+ exam (SY0-201) focuses more on being able to deal with security issues rather than just identifying them.
More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.


Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.